Digital Receipt Onno W. Purbo Reference ry/flash/digital_receipts.html

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Public Key Infrastructure and Applications
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Payment Gateway Onno W. Purbo Issu Utama Payment Method Security Certificate Authority Cyberlaw.
Digital Receipt Contoh Proses Onno W. Purbo
Dematerialization of Organisations’ Key Business Processes Security and e-Invoicing ATHENEE PALACE HILTON, Bucuresti September 21 st 2004 Genovel Iovu.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Trusted Electronic Transactions.  Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How.
Digital Cash Damodar Nagapuram. Overview ► Monetary Freedom ► Digital Cash and its importance ► Achieving Digital Cash ► Disadvantages with digital cash.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Chapter 8 Web Security.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
ELECTRONIC COMMUNICATION ACT 2000 Raashida & Sangeetha.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Research on Non-repudiation service By Yi Zhang. Motivation of Non-repudiation In paper-based business Electronic business transactions Less physical.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Electronic Data Interchange Computer readable forms for business documents such as invoices, purchase orders, delivery notes needed in B2B e- commerce.
1 Web Security Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats –integrity –confidentiality.
PKI interoperability and policy in the wireless world.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
Market Reform Group Electronic processing The role of standards and how it all fits together Beginners session - 23 rd January 2008 Rob Campbell, MRO.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Evincible  ™ Making e-Business Invincible Will Guyton Executive Vice President Will Guyton Executive Vice President.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
DIGITAL SIGNATURE.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Digital Signatures and Digital Certificates Monil Adhikari.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
E-Filing of IT Returns - salaried Employees An Overview of the Process of e-Filing of Returns.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Onno W. Purbo e-Banking Onno W. Purbo
Digital Receipt Contoh Proses
Onno W. Purbo Digital Receipt Onno W. Purbo
Onno W. Purbo Payment Gateway Onno W. Purbo
Onno W. Purbo e-Banking Onno W. Purbo
SECURITY MECHANISM & E-COMMERCE
Secure Electronic Transaction (SET)
Presentation transcript:

Digital Receipt Onno W. Purbo

Reference ry/flash/digital_receipts.html ry/flash/digital_receipts.html Applied Digital Receipts Solution, ValiCert

Gambaran Masalah Perlu bukti transaksi. Paper based evidence with handwritten signature. 50% komplain di VISA karena Internet Commerce, yang hanya 2% dari revenue.

Solusi yang dibutuhkan Non-repudiation for e-transaction. Capture transaction specific information. Safeguard info in a tamper-evident digital vault.

Internet Security Today Authentication Access Control Data privacy Comments Transaction integrity & authenticity must be verifiable, even for complex transaction with numerous trading partners.

Solusi Legal grade proof management. Digitally signed. Time stamped. Verified. Audited.

Contoh Digital Receipt Solutions

Standar Based Digital Signing LDAP Directory. X.509 certificates. SSL Browser.

Digital Receipt Achieve Evidence Creation Evidence Storage Evidence Access Evidence Verification Non-repudiation Origin delivery

Non repudiation of origin Who initiated this transaction? Who was transacted? When was the transaction completed? Was the transaction tampered with during transmission?

Non repudiation of delivery Was my transaction initiated? What was transacted? When was the transaction completed? Was the transaction tampered with during transmission?

Digital Receipt Solution Architecture

Receipt Notary XML based confirmation capture: various element of transaction Parties involved. Time of transaction. Generating Evidence for non- repudiation of origin & delivery.

Receipt Notary

Receipt Notary at Multiple Points of Transaction Flow

Receipt Vault Collating Reconciling. Storing. Analyzing. Querying. Validating digital receipts.

Contoh e-commerce + Digital Receipt

Monitor key e-commerce transaction points

Transaction Confirmation Format Overview

4 key sections Signature of issuer Transaction info Non repudiation Non repudiation Non repudiation

Simple Puchase Transaction Flow

Multiple Invoice

Inter-related Purchase Transaction Flow

Putting It All Together

Contoh Proses Purchase Order Invoice Delivery Notice

M-commerce